those years of rebirth

Chapter 273 Sino-American Hacking War

Seeing off Lin Deshuang, Wang Hengxiao felt very heavy.

The master's body began to weaken, and once there were signs, that day would not be far away.Whether it is Uncle Lin, Mr. Zhang Yicheng, or Master Li Jiansheng, they are all worried that the national security will be unstable after they leave.

In the current social environment that emphasizes peace, stability and harmony, the army will not be dispatched.

The police can only deal with ordinary petty theft.Special powerful departments such as national security and special police are particularly important. Once these two systems are in chaos, the consequences will be unimaginable.

Back then, Mr. Deng personally met Mr. Li Jiansheng and asked him to stay and take charge of the overall situation in the capital, which meant that he attached great importance to it.Now, Mr. Deng has left, and Mr. Zhang Yicheng has also left. The new generation of leaders is lukewarm about national security, and the political class maintains a kind of vigilance against the secretive and powerful intelligence agencies.

Another level of direct expression is that in the past two years, funds for national security and the Western Bureau have often been deducted.

Last year, Lin Deshuang told Wang Hengxiao that 200 yuan had been deducted from the original 50 million yuan a year's activity funds for the Western Bureau, and only 300 million yuan was approved for the special funding application of 100 million yuan.

A powerful institution that maintains the stability of the frontier is supported by only 250 million a year.

Lin Deshuang got drunk at Wang Hengxiao's place that time.

This year's situation is good, Mr. Li went out to ask for it in person, and the funds from the Western Bureau were directly approved for 500 million.

The situation is very complicated, both externally and internally!

Wang Hengxiao sighed, and understood why the master's body was weakening so quickly, the time was almost half less than what he estimated, thinking about these messy troubles every day, it's no wonder that he is not old.

Beep beep...the computer beeps an alarm.

Wang Hengxiao was taken aback, quickly cleared up his mood, turned on the computer screen, the host was turned on, and an intrusion notification sounded.

However, Wang Hengxiao smiled.

This is Jenny's prank, maybe Wang Hengxiao couldn't find it, so she used this method to force Wang Hengxiao to respond.

"Mr. Jenny, what's the matter?"

This is a very simple chat software written by Wang Hengxiao himself.

Jenny responded quickly: "Yes, it's urgent. I'll send you a page, and you can read it yourself."

A network connection was sent, Wang Hengxiao opened it with confidence, and a black page popped up.

"The battle has not stopped!" A few English letters hung on the screen.

This is the web address of Baidu, a Chinese Internet search company that has just been established for a year.Obviously, Baidu's homepage was hacked, and this picture was hung up.

With flying fingers, Wang Hengxiao quickly mobilized a few softwares, inputting commands line by line, the letters on the screen flickering, and the screen jumping.

Jenny sent another message: "The Sino-US hacker war two months ago was not over. Several hacker groups in the United States organized another operation. That's all I know. I don't know the specifics. It's because of your cuteness and writing." Come on, let me tell you."

After speaking, Jenny broke off contact.

Wang Hengxiao looked calm, and replied with two words: "Thank you!"

The Sino-US hacker war in [-] was a world-renowned cyber hacker battle event. It was also from this year that Chinese hackers entered the world stage and formed the Honker Alliance.

The cause of the incident was the collision incident in the South China Sea a few months ago, when a Chinese patrol plane collided with an illegal US plane, and Chinese pilot Wang Wei died and was buried in the sea.

At that time, the United States turned black and white, and became the incarnation of justice. China was the evil faction. A group of hackers even expressed their desire to retaliate and attack China's fledgling Internet, proving the strength of the United States!

It is not known whether the actions of American hackers are supported by the US government this time.Chinese hackers also took the initiative to attack many famous American websites, as well as some military government websites.

The battle between Chinese and American hackers lasted for more than a month. Chinese hackers used a sea of ​​fighters to break into the official White House website and deface the website.

At that time, Wang Hengxiao didn't know the situation, because he was preparing for elementary school graduation at school, and then when the battle was in full swing, Teacher Wen called to talk about it, and Jenny also called to mention it. During the May Day holiday, I came to the camp to log in to the network with a computer and participated in the last few days of fighting.

No one knows exactly how many Chinese hackers participated in the battle. In short, at that time, all the people were soldiers and knew a little bit of computer technology. They all participated in it with righteous indignation. pushing.

The battle at the top is the real decisive battlefield of the battle.

At that time, when more than a dozen masters from both sides were fighting to the death on the server of the official website in Beijing, China, Wang Hengxiao suddenly intervened.

Became the most powerful reinforcements, with a powerful data flow directly overwhelmed the seven top hackers in the United States, and led tens of thousands of Chinese hackers directly into the official website of the White House, broke through the White House website server with an unstoppable posture, modified Page.

It was a classic battle.

Achieved the reputation of Chinese hackers.

Several major hacker organizations in China are famous, Honker Alliance, Hacker Alliance, Rubik's Cube Organization and so on!

And only a few people know that the last stream of data that enters is not the so-called crowd tactics they arranged, but the help of one person.Several top hackers in the United States also know, but they don't recognize such powerful hackers in China and even, so they say that they were defeated by the crowd tactics.

Of course, when the official website of the White House was finally breached, it was indeed a crowd tactic. At least 5 people participated in the attack. Under the leadership of Wang Hengxiao, several masters directly broke through the server's protection, making it defenseless , In the end tens of thousands of people rushed in.

At that stop, China won, which was a little different from what Wang Hengxiao knew.

At this time, the retaliatory attack of American hackers struck again!

Wang Hengxiao frowned slightly. He knew about the Sino-US hacker war in [-] in his previous life, but he didn't know about it when it happened, but he came into contact with these things after he went to university.But I haven't heard that there will be a follow-up battle. I only know that when the last battle ended in May, it stopped.

Has it changed now because of your joining?

The American hacker organization continues, wanting to prove the superiority of its computer technology?

………………at this time!

Several major hacker organizations in China are gathering, and a secret website is discussing this matter.

Such blatant actions of American hackers are known to almost everyone with access to computers.

Honker Alliance, Hacker Alliance, Eagle Alliance, and Rubik's Cube Organization are the representatives of Chinese hacker organizations. They are the four largest, most scaled organizations with official information.

"The fight continues, so let's continue. Everyone is ready to fight. This time we will go to their hometown again and declare our national flag to be hung on their White House station."

This is what Red Yan, the chief hacker of the Honker Alliance, said.

"Of course we have to fight. This time the American hackers must have found more powerful hackers. We'd better do defense first, and don't lose our hometown."

Fat Guy, the chief hacker of Rubik's Cube, said: "If it wasn't for the sudden help of a mysterious person last time, our hometown would have been lost. Have you found out who he is? Can you get in touch?"

"Not found, the source of the data cannot be traced, and the network is not good, it is much better than us."

The chief hacker swordsman of the hacker alliance said: "There is no news at all, and it may not even be us Chinese. Don't expect too much this time, let's rely on ourselves."

"It's still the same as last time. Unite everyone. There is strength in numbers. It's what the great man said. Although many people don't understand, they can help to clear the data!"

The Eagles of the Hawks Alliance said: "There is not much time, everyone will go back and prepare immediately."

……………………hacker!

On the Internet, it is synonymous with mystery and terror.

The earliest predecessors of hackers were radio amateurs in the 70s and [-]s.At that time, there were no computers and networks, and radio was the most cutting-edge technology and the most convenient tool for long-distance communication. Amateurs used their own radio tools to swim in the world of radio, talk with many colleagues from far away, and experience novelty.

Then computers and the Internet appeared, and radio amateurs used their inherent advantages and logic to quickly master this new communication tool and find loopholes in it to do some illegal things.

In the history of hackers, there is one person who is legendary.

America's Super Hacker Kevin!

Hacking the U.S. North American Air Force chain of command as a teenager with a computer and a modem has been a legend ever since.

In the 90s, Kevin was synonymous with hackers, and it was he who let the world know that a weak hacker possesses a destructive power that is incomparable to a nuclear bomb with just a computer.

But then he was arrested and imprisoned, which also made another person famous. Computer security expert Uemura Masa, a Japanese-American computer expert, played the most important role in the process of hunting down Kevin.

Kevin just got out of prison last year, and within three years after being released from prison, he was not allowed to touch any radio and communication tools, including computers, telephones, modems, routers, etc.!It can be seen how powerful Kevin's threat is, and how deeply the world fears him.

At this time, Kevin in California received a letter.

Yes, he has no access to telephones, computers and all electronic products, and his only communication channel is the most primitive writing.

"Old friend, we need your help."

There are only a series of 0s and 1s on the letter paper. This is the most primitive computer machine language, so it is natural that Kevin, a super hacker, cannot be troubled.Kevin quickly deciphered this sentence from the above: "We have obtained permission to let you use the computer for one day through the FBI, and tomorrow you will get a best laboratory computer. We need your help. Our The target is Beijing, China."

(To be continued)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like